Sciweavers

213 search results - page 30 / 43
» On the complexity of Internet traffic dynamics on its topolo...
Sort
View
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 3 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
CORR
2010
Springer
338views Education» more  CORR 2010»
14 years 9 months ago
Optimal Distributed P2P Streaming under Node Degree Bounds
We study the problem of maximizing the broadcast rate in peer-to-peer (P2P) systems under node degree bounds, i.e., the number of neighbors a node can simultaneously connect to is ...
Shaoquan Zhang, Ziyu Shao, Minghua Chen
GLOBECOM
2007
IEEE
15 years 3 months ago
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks
— Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing ...
Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle, Hei...
PDP
2010
IEEE
15 years 1 months ago
hwloc: A Generic Framework for Managing Hardware Affinities in HPC Applications
The increasing numbers of cores, shared caches and memory nodes within machines introduces a complex hardware topology. High-performance computing applications now have to carefull...
François Broquedis, Jérôme Cle...
ICPPW
2007
IEEE
15 years 3 months ago
A Measurement of a large-scale Peer-to-Peer Live Video Streaming System
— Peer-to-Peer (P2P) technologies have found much success in applications like file distributions, and its adoption in live video streaming has recently attracted significant a...
Susu Xie, Gabriel Yik Keung, Bo Li